-
1
-
-
35348848696
-
Wherefore art thou r3579x?: Anonymized social networks, hidden patterns, and structural steganography
-
Banff, Alberta, Canada, May
-
L. Backstrom, C. Dwork, and J. Kleinberg. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In WWW, pages 181-190, Banff, Alberta, Canada, May 2007.
-
(2007)
WWW
, pp. 181-190
-
-
Backstrom, L.1
Dwork, C.2
Kleinberg, J.3
-
5
-
-
67650683099
-
A clustering approach for data and structural anonymity in social networks
-
A. Campan and T. M. Truta. A clustering approach for data and structural anonymity in social networks. In PinKDD, 2008.
-
(2008)
PinKDD
-
-
Campan, A.1
Truta, T.M.2
-
6
-
-
77954728128
-
k-isomorphism: Privacy preserving network publication against structural attacks
-
J. Cheng, A. W.-C. Fu, and J. Liu. k-isomorphism: Privacy preserving network publication against structural attacks. In SIGMOD, 2010.
-
(2010)
SIGMOD
-
-
Cheng, J.1
Fu, A.W.-C.2
Liu, J.3
-
8
-
-
72749109110
-
Anonymizing bipartite graph data using safe groupings
-
G. Cormode, D. Srivastava, T. Yu, and Q. Zhang. Anonymizing bipartite graph data using safe groupings. Proceedings of the VLDB Endowment, 1(1):833-844, 2008.
-
(2008)
Proceedings of the VLDB Endowment
, vol.1
, Issue.1
, pp. 833-844
-
-
Cormode, G.1
Srivastava, D.2
Yu, T.3
Zhang, Q.4
-
9
-
-
78650804208
-
A firm foundation for private data analysis
-
C. Dwork. A firm foundation for private data analysis. Communications of the ACM, 54(1):86-95, 2011.
-
(2011)
Communications of the ACM
, vol.54
, Issue.1
, pp. 86-95
-
-
Dwork, C.1
-
12
-
-
77951192010
-
Accurate estimation of the degree distribution of private networks
-
Miami, FL, December 2009
-
M. Hay, C. Li, G. Miklau, and D. Jensen. Accurate estimation of the degree distribution of private networks. In Proceedings of the 2009 IEEE International Conference on Data Mining (ICDM'09), pages 169-178, Miami, FL, December 2009.
-
Proceedings of the 2009 IEEE International Conference on Data Mining (ICDM'09)
, pp. 169-178
-
-
Hay, M.1
Li, C.2
Miklau, G.3
Jensen, D.4
-
13
-
-
79959979941
-
Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques
-
chapter Chapman & Hall/CRC Press
-
M. Hay, G. Miklau, and D. Jensen. Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques, chapter Enabling Accurate Analysis of Private Network Data. Chapman & Hall/CRC Press, 2010.
-
(2010)
Enabling Accurate Analysis of Private Network Data
-
-
Hay, M.1
Miklau, G.2
Jensen, D.3
-
14
-
-
78650524241
-
Resisting structural re-identification in anonymized social networks
-
M. Hay, G. Miklau, D. Jensen, D. Towsley, and C. Li. Resisting structural re-identification in anonymized social networks. VLDB Journal, 2010.
-
(2010)
VLDB Journal
-
-
Hay, M.1
Miklau, G.2
Jensen, D.3
Towsley, D.4
Li, C.5
-
15
-
-
41849128290
-
-
Technical report, University of Massachusetts Amherst
-
M. Hay, G. Miklau, D. Jensen, P. Weis, and S. Srivastava. Anonymizing social networks. Technical report, University of Massachusetts Amherst, 2007.
-
(2007)
Anonymizing Social Networks
-
-
Hay, M.1
Miklau, G.2
Jensen, D.3
Weis, P.4
Srivastava, S.5
-
19
-
-
78649302941
-
Inferring private information using social network data
-
Madrid, Spain
-
J. Lindamood, R. Heatherly, M. Kantarcioglu, and B. Thuraisingham. Inferring private information using social network data. In WWW, pages 1145-1146, Madrid, Spain, 2009.
-
(2009)
WWW
, pp. 1145-1146
-
-
Lindamood, J.1
Heatherly, R.2
Kantarcioglu, M.3
Thuraisingham, B.4
-
20
-
-
57149126815
-
Towards identity anonymization on graphs
-
Vancouver, Canada, June
-
K. Liu and E. Terzi. Towards identity anonymization on graphs. In SIGMOD, pages 93-106, Vancouver, Canada, June 2008.
-
(2008)
SIGMOD
, pp. 93-106
-
-
Liu, K.1
Terzi, E.2
-
22
-
-
72749117908
-
Privacy preservation in social networks with sensitive edge weights
-
Sparks, NV, April
-
L. Liu, J. Wang, J. Liu, and J. Zhang. Privacy preservation in social networks with sensitive edge weights. In Proceedings of 2009 SIAM International Conference on Data Mining (SDM'09), pages 954-965, Sparks, NV, April 2009.
-
(2009)
Proceedings of 2009 SIAM International Conference on Data Mining (SDM'09)
, pp. 954-965
-
-
Liu, L.1
Wang, J.2
Liu, J.3
Zhang, J.4
-
23
-
-
84455177094
-
Personalized social recommendations - Accurate or private?
-
A. Machanavajjhala, A. Korolova, and A. D. Sarma. Personalized social recommendations - accurate or private? In VLDB, 2011.
-
(2011)
VLDB
-
-
Machanavajjhala, A.1
Korolova, A.2
Sarma, A.D.3
-
24
-
-
79960019736
-
A survey of query auditing techniques for data privacy
-
S. Nabar, K. Kenthapadi, N. Mishra, and R. Motwani. A survey of query auditing techniques for data privacy. Privacy-Preserving Data Mining, pages 415-431, 2008.
-
(2008)
Privacy-Preserving Data Mining
, pp. 415-431
-
-
Nabar, S.1
Kenthapadi, K.2
Mishra, N.3
Motwani, R.4
-
26
-
-
35448955271
-
Smooth sensitivity and sampling in private data analysis
-
New York, NY, USA, ACM
-
K. Nissim, S. Raskhodnikova, and A. Smith. Smooth sensitivity and sampling in private data analysis. In STOC, pages 75-84, New York, NY, USA, 2007. ACM.
-
(2007)
STOC
, pp. 75-84
-
-
Nissim, K.1
Raskhodnikova, S.2
Smith, A.3
-
28
-
-
70350635777
-
Relationship privacy: Output perturbation for queries with joins
-
Providence, RI, June
-
V. Rastogi, M. Hay, G. Miklau, and D. Suciu. Relationship privacy: output perturbation for queries with joins. In Symposium on Principles of Database Systems (PODS), pages 107-116, Providence, RI, June 2009.
-
(2009)
Symposium on Principles of Database Systems (PODS)
, pp. 107-116
-
-
Rastogi, V.1
Hay, M.2
Miklau, G.3
Suciu, D.4
-
29
-
-
35048864339
-
Trading privacy for trust
-
Trust Management, Springer
-
J.-M. Seigneur and C. D. Jensen. Trading privacy for trust. In Trust Management, volume 2995/2004 of Lecture Notes in Computer Science, pages 93-107. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2995
, Issue.2004
, pp. 93-107
-
-
Seigneur, J.-M.1
Jensen, C.D.2
-
30
-
-
77954588562
-
Collective privacy management in social networks
-
Madrid, Spain
-
A. C. Squicciarini, M. Shehab, and F. Paci. Collective privacy management in social networks. In WWW, pages 521-530, Madrid, Spain, 2009.
-
(2009)
WWW
, pp. 521-530
-
-
Squicciarini, A.C.1
Shehab, M.2
Paci, F.3
-
31
-
-
84880102424
-
Reconstruction from randomized graph via low rank approximation
-
L. Wu, X. Ying, and X. Wu. Reconstruction from randomized graph via low rank approximation. In Proceedings of 2010 SIAM International Conference on Data Mining (SDM'10), Columbus, OH, April 2010.
-
Proceedings of 2010 SIAM International Conference on Data Mining (SDM'10), Columbus, OH, April 2010
-
-
Wu, L.1
Ying, X.2
Wu, X.3
-
32
-
-
84856191070
-
A survey of algorithms for privacy- Preservation of graphs and social networks
-
Kluwer Academic Publishers
-
X. Wu, X. Ying, K. Liu, and L. Chen. A survey of algorithms for privacy- preservation of graphs and social networks. In Managing and Mining Graph Data. Kluwer Academic Publishers, 2010.
-
(2010)
Managing and Mining Graph Data
-
-
Wu, X.1
Ying, X.2
Liu, K.3
Chen, L.4
-
35
-
-
72749120035
-
On link privacy in randomizing social networks
-
X. Ying and X. Wu. On link privacy in randomizing social networks. In PAKDD, 2009.
-
(2009)
PAKDD
-
-
Ying, X.1
Wu, X.2
-
37
-
-
77954584058
-
To join or not to join: The illusion of privacy in social networks with mixed public and private user profiles
-
Madrid, Spain, April
-
E. Zheleva and L. Getoor. To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. In WWW, pages 531-540, Madrid, Spain, April 2009.
-
(2009)
WWW
, pp. 531-540
-
-
Zheleva, E.1
Getoor, L.2
-
38
-
-
70350632870
-
A brief survey on anonymization techniques for privacy preserving publishing of social network data
-
B. Zhou, J. Pei, and W.-S. Luk. A brief survey on anonymization techniques for privacy preserving publishing of social network data. SIGKDD Explorations, 2008.
-
(2008)
SIGKDD Explorations
-
-
Zhou, B.1
Pei, J.2
Luk, W.-S.3
-
39
-
-
84865065669
-
K-automorphism: A general framework for privacy preserving network publication
-
L. Zou, L. Chen, and M. T. Özsu. K-automorphism: A general framework for privacy preserving network publication. Proceedings of the VLDB Endowment, 2(1):946-957, 2009.
-
(2009)
Proceedings of the VLDB Endowment
, vol.2
, Issue.1
, pp. 946-957
-
-
Zou, L.1
Chen, L.2
Özsu, M.T.3
|